7.8
CVSSv2

CVE-2009-0758

Published: 03/03/2009 Updated: 12/08/2010
CVSS v2 Base Score: 7.8 | Impact Score: 6.9 | Exploitability Score: 10
VMScore: 694
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

The originates_from_local_legacy_unicast_socket function in avahi-core/server.c in avahi-daemon 0.6.23 does not account for the network byte order of a port number when processing incoming multicast packets, which allows remote malicious users to cause a denial of service (network bandwidth and CPU consumption) via a crafted legacy unicast mDNS query packet that triggers a multicast packet storm.

Vulnerable Product Search on Vulmon Subscribe to Product

avahi avahi-daemon 0.6.23

Vendor Advisories

Debian Bug report logs - #517683 avahi-daemon: reflector creates packet storm on legacy unicast traffic Package: avahi-daemon; Maintainer for avahi-daemon is Utopia Maintenance Team <pkg-utopia-maintainers@listsaliothdebianorg>; Source for avahi-daemon is src:avahi (PTS, buildd, popcon) Reported by: Rob Leslie <rob@mar ...
It was discovered that Avahi incorrectly handled certain mDNS query packets when the reflector feature is enabled, which is not the default configuration on Ubuntu A remote attacker could send crafted mDNS queries and perform a denial of service on the server and on the network This issue only affected Ubuntu 804 LTS and 904 (CVE-2009-0758) ...